[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-users] Q: anybody succeeded getting NFS locks with SLES10 (x86_64)?



Hi,

I'm having problems getting locks on a SLES10 x86_64 NFS client. Running the 
plain 
(non-XEN) kernel I can have NFS locks. The effect is that locks are either 
unavailable, or the mount hangs.

I've files bug # 221998 on Novell's bugzilla.

When rebooting Dom=, I also had this Oops today:

Unable to handle kernel paging request at 0000000100000027 RIP: 
<ffffffff8012746c>{dup_fd+412}
PGD 13b1e067 PUD 0 
Oops: 0002 [1] SMP 
last sysfs file: /devices/pci0000:00/0000:00:01.0/0000:01:01.1/subsystem_device
CPU 2 
Modules linked in: nfs nfsd exportfs lockd nfs_acl sunrpc hfs vfat fat joydev 
st 
nls_utf8 xt_pkttype ipt_LOG xt_limit ipt_TCPMSS xt_physdev bridge blkbk netbk 
netloop af_packet bonding button battery ac ip6t_REJECT xt_tcpudp ipt_REJECT 
xt_state iptable_mangle iptable_nat ip_nat sr_mod iptable_filter 
ip6table_mangle 
ip_conntrack nfnetlink ip_tables ip6table_filter ip6_tables x_tables ipv6 loop 
usb_storage usbhid hw_random ohci_hcd i2c_amd756 usbcore shpchp i2c_amd8111 
i2c_core pci_hotplug ide_cd cdrom e1000 reiserfs dm_snapshot dm_mod fan thermal 
processor sg mptsas mptscsih mptbase scsi_transport_sas amd74xx sd_mod scsi_mod 
ide_disk ide_core
Pid: 27024, comm: nfsserver Not tainted 2.6.16.21-0.25-xen #1
RIP: e030:[<ffffffff8012746c>] <ffffffff8012746c>{dup_fd+412}
RSP: e02b:ffff88000e013d98  EFLAGS: 00010206
RAX: dfffffffffffffff RBX: ffff8800155bd800 RCX: 000000000000003d
RDX: 0000000000000000 RSI: ffff88000f1b9000 RDI: 00000000ffffffff
RBP: ffff880000666b80 R08: 000000000000003e R09: ffff8800186362c0
R10: ffff880014aa49f0 R11: 000000000000003e R12: 0000000000000100
R13: ffff8800089c5b80 R14: ffff8800089c5ed8 R15: ffff88000e013e04
FS:  00002b37d9ce9ae0(0000) GS:ffffffff80421100(0000) knlGS:0000000000000000
CS:  e033 DS: 0000 ES: 0000
Process nfsserver (pid: 27024, threadinfo ffff88000e012000, task 
ffff8800075b2080)
Stack: 0000000045618214 ffff8800005b3350 ffff8800005b3350 ffff8800005b3100 
       00000001075b2080 ffff8800005b3100 0000000000000000 ffff8800005b3100 
       ffff8800075b2080 0000000000000000 
Call Trace: <ffffffff8012759d>{copy_files+79} 
<ffffffff801281d3>{copy_process+1235}
       <ffffffff801297d4>{do_fork+197} <ffffffff8010aa6a>{system_call+134}
       <ffffffff80179bff>{sys_newstat+40} <ffffffff80134b82>{sigprocmask+180}
       <ffffffff8010aa6a>{system_call+134} 
<ffffffff8010ae25>{ptregscall_common+61}

Code: f0 ff 47 28 eb 1f 49 8b 71 20 4c 89 c2 44 88 c1 48 c1 ea 06 
RIP <ffffffff8012746c>{dup_fd+412} RSP <ffff88000e013d98>
CR2: 0000000100000027


Regards,
Ulrich


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.